General
-
Target
New order.exe
-
Size
702KB
-
Sample
230519-psn9gsgf6x
-
MD5
caecd32bcc0b7e065924dbf4c37a01e4
-
SHA1
eb5e5e14b83ff5259f5908de1179cba4f41fe3df
-
SHA256
0e77fc7adca97943ad5bca6f1cd20d05e80bcdda01b29087bf1d6fccd4379063
-
SHA512
7f4c4e9089a45eeaac87359e0796613d56c5fdd54e91bc5d07f0cd6b1253c8b34d3ad269c1b79d6799cfd1e1fba2a2ee46b69b5bd1afabedddb7d0813a0f11ee
-
SSDEEP
12288:zMqBG/uEspgx3NJx+FrfMzRWMZMYvXFt7F2yaKnS42klrcg:4qUEmdx+J4MuVtsqnxz
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
New order.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6277498666:AAH4URlmeSysUKKZG20OTvrve55BRMLEu_o/
Targets
-
-
Target
New order.exe
-
Size
702KB
-
MD5
caecd32bcc0b7e065924dbf4c37a01e4
-
SHA1
eb5e5e14b83ff5259f5908de1179cba4f41fe3df
-
SHA256
0e77fc7adca97943ad5bca6f1cd20d05e80bcdda01b29087bf1d6fccd4379063
-
SHA512
7f4c4e9089a45eeaac87359e0796613d56c5fdd54e91bc5d07f0cd6b1253c8b34d3ad269c1b79d6799cfd1e1fba2a2ee46b69b5bd1afabedddb7d0813a0f11ee
-
SSDEEP
12288:zMqBG/uEspgx3NJx+FrfMzRWMZMYvXFt7F2yaKnS42klrcg:4qUEmdx+J4MuVtsqnxz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-